CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded...
High severity
Unreviewed
Published
Apr 23, 2025
to the GitHub Advisory Database
•
Updated Apr 23, 2025
Description
Published by the National Vulnerability Database
Apr 23, 2025
Published to the GitHub Advisory Database
Apr 23, 2025
Last updated
Apr 23, 2025
CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the configuration of the wireless hotspot. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-24349.
References